The document discusses security challenges facing power grids and smart grids. It notes increasing blackouts in the US and cyber security incidents globally. The Indian power grid is vast in size and undergoing smart grid pilots. Security encompasses operational, physical and cyber security. Challenges include the tight coupling of IT and physical infrastructure, legacy systems, and continuous availability demands. Collaboration between industry, government and academia is needed to address challenges through standards, technologies and a process-based approach.
(a).What is smart grid technology?
(b).Role and necessity of smart grid technology
(c).Benefits and application of grid
(d).Various challenge of grid
(e).Best possible location
By using smart grid technology energy can be utilized to the maximum and would not be wasted. It refers to the modernized version of the earlier traditional method of energy supply. Allows consumers to interact with the grid.
Introduce Smart Grid Technologies to improve and utilize renewable energy resources in generating green electricity energy also provide an overview for IEEE standards in Smart Grid Technologies .
Smart Grid is a domain that straddles several technologies. This is an attempt to present a quick outline of the relevant technologies. The presentation also includes a bird's eye view of the key smart grid players including large companies, start-ups and power utilities.
Electricity is a necessity in the modern world. In the traditional power system, electricity is being generated and transmitted through a one-way transmission and distribution system called the grid. The smart grid is an intelligent power grid designed to handle distributed resources using communication technology employing smart meters and control system. It promises more efficient, secure and climate friendly power system.
Shari Ishikawa from HECO describes what the term Smart Grid means, and the Smart Grid-related projects HECO is working on. Slides from the REIS seminar series at the University of Hawaii at Manoa on 2009-10-15.
(a).What is smart grid technology?
(b).Role and necessity of smart grid technology
(c).Benefits and application of grid
(d).Various challenge of grid
(e).Best possible location
By using smart grid technology energy can be utilized to the maximum and would not be wasted. It refers to the modernized version of the earlier traditional method of energy supply. Allows consumers to interact with the grid.
Introduce Smart Grid Technologies to improve and utilize renewable energy resources in generating green electricity energy also provide an overview for IEEE standards in Smart Grid Technologies .
Smart Grid is a domain that straddles several technologies. This is an attempt to present a quick outline of the relevant technologies. The presentation also includes a bird's eye view of the key smart grid players including large companies, start-ups and power utilities.
Electricity is a necessity in the modern world. In the traditional power system, electricity is being generated and transmitted through a one-way transmission and distribution system called the grid. The smart grid is an intelligent power grid designed to handle distributed resources using communication technology employing smart meters and control system. It promises more efficient, secure and climate friendly power system.
Shari Ishikawa from HECO describes what the term Smart Grid means, and the Smart Grid-related projects HECO is working on. Slides from the REIS seminar series at the University of Hawaii at Manoa on 2009-10-15.
This presentation gives an introduction to security of smart grid and reviews the most important related guidelines like NISTIR 7628 and IEEE 2030. At the final section, it reviews the US cyber security program for the energy sector as a case study.
L'intervento di Luigi Atzori in occasione del workshop "Microreti intelligenti, ICT e mobilità elettrica", che si è svolto a Macchiareddu il 27 novembre 2015.
L'evento è stato organizzato dal Progetto Cluster Elettronica di Sardegna Ricerche.
The following is a smart grid security presentation I developed for my fellow task force members on NERC's 2010 Smart Grid Task Force. The charts included are very helpful in understanding at a glance, where the risks and threats to smart grid reliability and security lie. In the end though it is the 'human factor' that is most important to keep in mind in risk mitigation.
Smart grids is an added communication capabilities and intelligence to traditional grids,smart grids are enabled by Intelligent sensors and actuators, Extended data management system,Expanded two way communication between utility operation system facilities and customers,Network security ,National integration ,Self healing and adaptive –Improve distribution and transmission system operation,Allow customers freedom to purchase power based on dynamic pricing ,Improved quality of power-less wastage ,Integration of large variety of generation options.
We have seen the more complex and critical infrastructure the more vulnerable they are. From the Year of 1994 we have seen lots of incidents where SmartGrid were Hacked the latest and booming incident was Stuxnet Worm which targeted Nuclear Power System of Iran and Worldwide.There are different types of Attacks we will see. Security needed for Smart Grid.
Securing Critical Infrastructures with a cybersecurity digital twin Massimiliano Masi
Critical Infrastructures are common targets for cyber-and-physical attacks. Smart Grids, Water Transport Systems, Railway, or Motorway witness an increase of malware and attacks partially due to the IT/OT convergence. Usually, critical infrastructures are composed by legacy software or hardware that cannot be easily patched or upgraded, facilitating the work of the attackers by exposing vulnerabilities solved in IT decades ago. Moreover, it is usually impossible to have a test system for such infrastructures, where a security countermeasure is evaluated for its impact. In fact, in OT systems, availability is of its utmost importance, thus adding a security countermeasure has to be carefully evaluated to not hinder such property. To overcome such shortcomings, digital twins are used. In this talk, it will be presented how digital twins specifically devised for cybersecurity are used for the evaluation of threats in cyber-and-physical systems in an industrial environment. In particular, it will be shown how a digital twin will be systematically derived from the Architectural representation of a real-world industrial system (the "collaborative intelligent transport system") and how the security measures are evaluated with an specific architectural view.
Cybersecurity Considerations for Power Substation SCADA Systems Using IEC 618...Power System Operation
Because of recent cyber-attacks and threats against power utilities, cybersecurity continues to increase in importance and be on the minds of substation design engineers.
One major concern for power distribution utilities is “ensuring that all communication protocols performing control functions and data acquisition for substations are properly secured. With IEC-61850 being one of the most widely used communications protocols by utilities today, particularly in distribution automation (DA),” increases the need for greater security in communication protocols. [1]
IEC-61850 is also becoming the preferred standard for substation design and operations due to the common framework and object-oriented design for point names as well as the increased performance and lower lifecycle cost of SCADA systems utilizing the methodology and protocols. This paper will discuss major vulnerabilities and cybersecurity considerations that require proper analysis when designing and implementing a secure IEC-61850 standard-based SCADA system within a power substation. However, this paper will not discuss implementation methods or provide implementation concepts.
Matthew Hause: The Smart Grid and MBSE Driven IoT EnergyTech2015
EnergyTech2015.com
Track 3 Session 3
Moderator: Mark Walker
The integration of the Internet of Things (IoT) and MBSE in an Energy System and Complex energy grid management in a changing and dynamic future.
Matthew Hause – Paper 1: Making the Smart Grid Smarter, MBSE Driven IoT The future of IoT success, including technology advancements and revenue generating potential across the business spectrum, is dependent on the application of solid Systems Engineering and Model Based Systems Engineering (MBSE) principals. Without MBSE, the complexity involved in the design, development, and deployment of IoT systems would consume both system and operational providers. Absent of any industry standards, IoT systems cannot be built in a vacuum and their success will only be realized through application of modern day systems engineering processes, methods, and tools. The infrastructure and management will need to be established prior to, or in conjunction with, the smart systems that support them. This paper will show an Energy system and connected systems and how an MBSE and SoS approach will help guide development.
Smart Grid, Smart Metering and CybersecurityDavid Wallom
Presentation of Smart Metering and Energy with discussion around cybersecurity of these and other critical national infrastructure during Wolfson College event
An embedded system's input devices have quite limited capabilities. Since there won't be an input device or mouse, as there are in computer systems, interacting with the embedded system won't be simple. Input devices for user interaction are absent from numerous embedded systems used in process control. They receive input from transmitters or detectors that will generate electrical signals which are fed to other mechanisms.
The capabilities of the embedded systems' external devices are also extremely constrained. A few LEDs may be present in some embedded systems to show the modules' overall health or to signal alarms visually. Some important aspects may also be displayed on LCDs.Embedded systems are widely used in a variety of industries. Due to the wide range of applications for these systems, the embedded system market is one of the most dynamic.
Consumer devices, process automation, medical technology, wireless and data communication, the military, automotive, and aerospace, as well as household appliances are all examples of this.
since our electrical system consists of many interconnections .in order to have a proper transmission we need grid if we incorporate some sensors it results in smart grid .today grid system consists of all interconnection tapping points
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Connector Corner: Automate dynamic content and events by pushing a button
Security challenges to power grid and smart grid infrastructures
1. Security Challenges to
Power Grid and Smart
Grid Infrastructures
P.K.Agarwal
Additional General Manager
Power System Operation Corporation Ltd.
New Delhi, India
2. Outline
• Why security of power grid and smart grid
infrastructure is important
• Security in the context of power grid and smart
grid.
• Operational Security
• Physical Security
• Cyber Security
• Challenges & Way forward
8thNov2013
2
3. Some Facts
•US Blackouts
• During the past two decades, blackouts have
increased 124 percent -- up from 41
between 1991 and 1995, to 92 between
2001 and 2005, according to research at the
University of Minnesota
• In the most recently analyzed data available,
utilities reported 36 such outages in 2006
alone
Source -
8thNov2013
3
7. Power Grid
• Electrical grid is a man made miracle.
• Largest machine ever made.
• Managed by mutual co operation.
• Fulfills diverse requirements of
•System Operation
•Market Operation
• A Critical infrastructure of a Nation.
8thNov2013
7
8. Vast Size – Widely Spread
• Generating Stations - More than 450
• Generators - More than 1400
• Substations - More than 2000
• Circuit Kms of line - More than 270,000
• MW capacity - More than 220 GW
• Transformation Capacity - More than 480,000
• Nos of stakeholders - More than 160
8thNov2013
8
9. Smart grid
• Most significant upgrade to power grid in the last 100
years.
• Most flexible and transparent by the use of ICT.
• Has additonal new functionalities
• Self-healing.
• Motivates and includes consumers(Demand-0response).
• Accomodates all generation and storage options.
• Enables Electricity Markets.
• Optimize asset allocation and operational efficiently
8thNov2013
9
10. High Penetration
• DISCOMs – 43
• Utilities – 163
• Traders – 44
• power exchanges – 2
• OA applications - 32000 per year
• OA consumers - More than 2100
8thNov2013
10
11. Indian Smart Grid Pilot Projects
8thNov2013
11
MoP has approved 14 smart
grid pilots for execution
Functionalities being opted:
• AMI for Residential,
Commercial and Industrial
• Peak Load Management
• Outage Management
• Power Quality
• Renewable Integration
• Micro Grids
• Distributed Generation
Source – Desi Smart Grid
12. Smart Grid Pilot by POWERGRID
8thNov2013
12
Source – Power Grid Corporation
13. Smart Grid Functions Implemented
• Advanced Metering Infrastructure (AMI)
• Virtual Demand Response (DR)
• Street Light Automation
• Outage Management System (OMS)
• Net-Metering by Renewable Integration
• Power Quality Management
• Smart Home
• Micro Grid Controller
• Electric Vehicle
8thNov2013
13
14. Security of Power Grid and Smart Grid
• Traditionally security to power system means – to
withstand unexpected disturbances
• Such as short circuit
• Loss of a power system component such as
Transmission line
• In today’s world secuirty focus has expanded to
include
• disturbances due to overloading or unexpected causes
• Physical attacks or
• Cyber attacks
8thNov2013
14
17. Security of Power Grid/Smart Grid
• Operational Security
• Physical Security
• Cyber Security
8thNov2013
17
18. Operational Security
• THE DEGREE OF RISK
POWER SYSTEM’S ABILITY TO SURVIVE DISTURBANCES
(CONTINGENCIES) WITHOUT INTERRUPTION.
• Robustness of the system to disturbances.
• Depends on the system operating condition
• Depends on the contingent probability of disturbances.
8thNov2013
18
19. Ensuring Operational Security
• Real time monitoring of transmission line flows - they are
not overloaded.
• Contingency analysis – a “What if analysis” of grid
situations – ensuring that system is secure .
• Corrective preventative action - so that if contingencies
occur - do not create a system breakdown.
• The contingency analysis is repeated periodically.
• Load and generation balance - frequency stability – keep
it between permissible band (49.7 – 50.2 Hz)
• Inter regional transfers monitoring.
• Monitoring status of all - any mal-function the operator is
alerted through alarms.
8thNov2013
19
20. Synchrophasor technology…
• use monitoring devices called phasor measurement units
(PMUs) using GPS
• measures the instantaneous voltage, current, and frequency
at specific locations in an electric power transmission system
(or grid)
• Has high sampling rate 20 or more times per electrical cycle
which is 1200 or more times per second.
• converts the measured parameters into phasor values,
typically 25 or more values per second.
• adds a precise time stamp using GPS to these phasor values
turning them into synchrophasors.
• The resulting high speed data
• Enables transmission grid operators to have a high resolution “picure”
of conditions throught the grid.( Situational Awareness)
8thNov2013
20
21. Wide Area Monitoring - Synchrophasors
8thNov2013
21
Enhanced Situational Awareness to Monitor Health of the Grid
Grid Stress Phase Angular Separation
Grid Robustness Damping Status and Trend(s)
Oscillations Sustained Low Frequency oscillation
Frequency Instability Frequency Variation Across
Interconnection
Voltage Stability Low Voltage Zones / Voltage Sensitivities
Angular Stability Power-angle Sensitivities, stability
Margin (s) “How far from the threshold value?”
23. New tools – increased visibility
• The PMU in power grid and advance metering
infrastructure in smart grid - provide “MRI”
capability compared to the “x-ray” quality
available from SCADA technology.
• Significantly increased situational awareness -
fine-grained command and control.
• Digital information technology allows close
interaction of the transmission and distribution
grid.
8thNov2013
23
24. The Biggest Myth!!
● “We are secure because we are isolated from the Internet
and other networks”.
● After Stuxnet in Iran ....
● Myth gone haywire….
● Its only a matter of time!!
– Social Engineering => Sneakernet
– Cyber breach will not effect us as we are not controlling
from remote.
8thNov2013
24
25. • TODAY’S ELECTRIC UTILITY…..
• relies increasingly on digital electronic devices and
communications for
• to optimize system operation
• and increase reliability,
• More automation and two way communication means –
• Increased cyber attack vector
• Inccreased attck surface
• Cybersecurity remains a constant challenge.
8thNov2013
25
Cyber Security a constant challenge…
26. What is at Risk?
[Excluding Damages due to PhysicalAccess]
● Thumb Rule: Any thing / process to which data can be
written to either through Software or Manually by User /
Administrator.
● Possible Targets:
– Relay Configurations
– Control System Settings – Changing of control parameters,
limiting values
– Erasing complete data from SCADA servers.
– Freezing values of critical line loadings.
– Denial of Service (communication to control room)
8thNov2013
26
27. • Eletrical grid is fundamentally designed with security by
obscurity and isolation.
• Protocols – without in built security.
• Physical Security was the paramount concern.
• Integration of electric and information infrastructure -
• Increased attack vector and attack surface
• More automation – more vulnerabilities.
• Vulnerability weaponization - The vulnerability arms
race —total disclosures in 2012 increased 19 percent
from 2011
• Mobile vulnerabilities
• Web applications remain vulnerable
• Mature technologies, continued risk
8thNov2013
27
Many challenges….
33. Physical Security…
• Power grid and Smart grid are critical infrastructure of the
Nation.
• Infrastructure is wide spread.
• Almost impossible to guard each and every point.
• Synchronised coordinated operation
• Damage to one part may cause cascade damage.
• Control centers are strategic locations.
• Any risk to them may enganger thewhole infrastrucuture.
• Any unintentional mal-operation may render infrastructure in a
state of grave danger.
8thNov2013
33
34. Physical Security Risks…..
• Risk impact is very high.
• Capturing of premise.
• Capturing control of control room.
• Damages to critical equipment.
8thNov2013
34
35. Mitigation…..
• Backup control centers.
• Defense in depth strategy.
• Security Guard/CCTV/Access Control.
• Zoning of premises
• Secuirty Mock Drills.
• Close cordination with local security authorities.
• Vigilant Staff.
• Security audit and certificaion.
8thNov2013
35
36. Cyber-Physical Approach to Smart
Grid Security
• Physical systems operated are monitored, coordinated,
controlled by a computing and communication core.
• Computing and communication capabilities will soon be
embedded in all types of objects and structures in the physical
environment.
• Smart grid will have more and more such embedded objects.
• Protecting critical infrastructure is vital to the health of an
economy;
• one such infrastructure, the electric power transmission grid,
forms one of the largest complex nterconnected networks
ever built.
8thNov2013
36
37. • Tight coupling between ICT and physical system introduces
new security concerns and requires a rethinking to common
security approach.
• The smart grid will reach every house and building, giving
potential attackers easy access to some of the grid
components.
• A coordinated assessment of cyber and physical risks keeping
the whole grid security goals in mind is needed.
• Bringing together cyber security and system theory is needed
to address the security requirements.
• Cyber attacks can cause disruptions that transcend the cyber
realm and affect the physical world –Stuxnet.
• Physical attacks can affect the cyber system - integrity of a meter
can be compromised by using a shunt to bypass it
8thNov2013
37
Security of Cyber-Physical System
39. Challenges to Power/Smart grid security
• Continuous availability demand.
• Time-criticality.
• Constrained computational resources on edge
devices
• Large physical base.
• Wide interface between digital and analog
signals.
• Social acceptance including cost effectiveness.
• User reluctance to change.
• Legacy issues
8thNov2013
39
40. Facts
• Smart Grid security is not a revolutionary concept, it is
evolutionary.
• Should not pursue it as if it is a target to achieve but,
rather, as a journey.
• Industry, government and academia coming together on
policy innovation and standards development.
• Universities and R&D organizations collaboration for
inventing technologies.
• Power grid and Smart grid is an corodinated effort. Any
deficiency may give access to hackers..
8thNov2013
40
41. Facts
• Security is complex
• Security is a process and not a single product
• Security Solutions should be open to third party
vendors
• Compliance approach should be the prefered
method and starting point
• Security needs experienced security expertise
8thNov2013
41
42. References…..
• Cyber–Physical Security of a Smart Grid Infrastructure - By Yilin Mo, Tiffany
Hyun-Jin Kim, Kenneth Brancik, Dona Dickinson, Heejo Lee, Adrian Perrig, and Bruno
Sinopoli.
• Smart Grid Security Issue – IEEE ecurity and Privacy, Januaer/Ferbuary 2010.
• Introduction SCADA Security for Managers and Operators - September 28, 29,
2006 – Idaho National Laboratory.
• Why is the Smart Grid is Target - 3o June 2012 - Symantec
• Risk Management Framework for the Power Grid Cyber-Physical Security -
Riadh W. Y. Habash1*, Voicu Groza1 and Kevin Burr, - School of Electrical Engineering and
Computer Science, University of Ottawa, Ottawa, Ontario, Canada. Kylowave Inc., Ottawa,
Ontario, Canada.
• A Taxonomy of Cyber Attacks on SCADA Systems - Bonnie Zhu, Anthony Joseph,
Shankar Sastry, Department of Electrical Engineering and Computer Sciences, University of
California at Berkeley, CA
• Desi Smart Grid Portal www.desismartgrid.com
• Website www.powergridindia.com of Power Grid Corporation of India
• https://apps.powergridindia.com/smartgrid/smartgrid_video.aspx
8thNov2013
42